It is sometimes useful to add comments at the top of a source file. This
patch changes hidden API list generation to ignore lines beginning with
a hash.
Note that due to the sorting constraints on hidden API lists, comments
can be only at the top of the files.
Test: m appcompat
Change-Id: I1bc6fd44d1b1f10a5adc45093d7f7ed5a0c5a54f
We want to preserve the same semantics as P wrt dark greylist. This will
eventually become the "blacklist for target SDK >= P".
Bug: 113881436
Test: phone boots
Change-Id: I3bb72102e1d054eb0f2cae089ab633a0bc2bb276
It's not used, and there is no reason to keep it now that P has been
pushed to AOSP.
Test: N/A
Change-Id: Ib025116032bdb215dba5b51de4c7ea8ad7dd10d5
Merged-In: I51bf94b736cae57780708a70947511c409a2dfb6
Also make the new lib only use system-apis.
This allows mainline module to use the new
RestrictedLockUtilsSettingLib.
Unfortunately the whole RestrictedLockUtils would have caused to much
new system-api. Hence it was split into RestrictedLockUtils and
RestrictedLockUtilsInternal. This caused a lot of trivial code changes.
Bug: 110953302
Test: Built
Change-Id: I693b3bf56f3be71f0790776e3aad5694717786ef
For all remaining unannotated code.
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: I67c8b71ea535ebffb10bf577948bd4ccb8ca069d
For all remaining unannotated code.
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: I32861fa341a08f11a9c50c07a1ef7404dadf6bb6
Merged-In: I67c8b71ea535ebffb10bf577948bd4ccb8ca069d
One DisplayContent contains one InputMonitor now.
- Change setInputWindow of InputManagerService updated by displayId,
so Window Handles in InputDispather can be updated by each DisplayContent.
- Only exist one focus in current state, reset it if in removed DisplayContent,
will be updated by default display or focused display.
- Add displayId parameter for createInputConsumer and destroyInputConsumer,
so InputConsumer from PIP, RecentApp and Wallpaper can be supported in multi-display.
Bug: 111363643
Test: atest WindowManagerSmokeTest ActivityManagerMultiDisplayTests
Test: atest com.android.server.wm.DisplayContentTests
Test: atest libinput_tests inputflinger_tests
Change-Id: I999c355be1789af5759f00206475d004e10116e3
setFinalCrop functionality is reimplemented by creating a new bounds layer
and applying a crop on this layer. see ag/4625718
Test: go/wm-smoke
Change-Id: I3ffb6dc2e2afd5170f6c6dee9e928ed0600656b1
App developers must never need to call this IPC method directly via
reflection. The same functionality has been exposed as a public API
InputMethodManager#getEnabledInputMethodList() since its beggining.
Just for the record, this is what
InputMethodManager#getEnabledInputMethodList() is doing.
public List<InputMethodInfo> getEnabledInputMethodList() {
try {
return mService.getEnabledInputMethodList();
} catch (RemoteException e) {
throw e.rethrowFromSystemServer();
}
}
Bug: 112722706
Test: compile
Change-Id: Idf9fa866f73dbd151bb67f60dbd57041d9055a23
These permissions are now signature only and have been
removed from the SDK. Add to light greylist.
BUG: 111131054
Test: make & verified generated file
out/target/common/obj/PACKAGING/hiddenapi-light-greylist.txt
contains the permissions.
Change-Id: I9ba89b42906a3e352184c9df9132cf1236271592
These APIs are only seen to be used by code in java packages
com.android.server.* which corresponds to AOSP code that has been linked
into applications.
Linking system server code into apps like this is unlikely to work, and
should not be expected to work. It's likely that this has been done
accidentally, and the code is not actually used at runtime.
Bug: 112826823
Test: m
Change-Id: If4a3bbe8a0d1a81384b47b35cfcd9a0723be8273
Merged-In: I0a72458d66b6af515e1da68d449d9b166680c258
These APIs are only seen to be used by code in java packages
com.android.server.* which corresponds to AOSP code that has been linked
into applications.
Linking system server code into apps like this is unlikely to work, and
should not be expected to work. It's likely that this has been done
accidentally, and the code is not actually used at runtime.
Bug: 112826823
Test: m
Change-Id: I0a72458d66b6af515e1da68d449d9b166680c258
In P we moved destroying per-user shared storage into installd,
where it can iterate quickly over large sets of files. This change
now moves cleaning/destroying of per-app shared storage data down into
installd, letting us greatly simplify the logic in PMS to no longer
require spinning up DefaultContainerService. This also fixes an
obscure bug where DCS (which always runs as USER_SYSTEM) wasn't able
to clear shared storage for secondary users.
This also gives us the ability to target specific storage devices
by UUID, such as when the user has migrated their primary shared
storage to an adopted device.
We no longer distinguish between keeping or deleting OBB files
during various operations, since upcoming changes in the Q release
will mean OBB files are no longer shared between users, and they'll
now live inside a sandbox that will be fully cleared when the user
clears data. (Going forward, apps should be using splits instead
of OBBs, so they're effectively deprecated.)
Uses newer "const" feature of AIDL to ensure constant values remain
consistent between native and Java code.
Bug: 111854851, 111838160
Test: atest android.appsecurity.cts.StorageHostTest#testCache
Change-Id: Ib90be155718a768da76110fbfcf010a471b37378
Apps can never directly IInputMethodManager.{add,remove}Client() in a
meaningful way, because
1. These Binder methods are implemented in InputMethodManagerService
(IMMS) but unnecessarily exposed to application processes. The
only valid caller of these methods is WindowManagerService.
Actually with my recent change [1], any incoming call of these
methods from the application processes will always be rejected.
2. The purpose of these callbacks is maintaining a per-process
callback (IInputMethodClient) from each application process to
IMMS. Since WindowManagerService is responsible for dealing with
this step, there is no reason for app developers to call these
accidentally exposed hidden Binder methods. If there was an
application that was trying to call these methods via reflection,
it must be trying to bypass caller verification of some other IME
APIs by registering a fake IInputMethodClient callback.
3. However, even if an application succeeded to register a fake
IInputMethodClient to IMMS, IMMS still has additional verification
IWindowManager.inputMethodClientHasFocus(IInputMethodClient),
which cannot be spoofed with such a fake connection.
Therefore having these entries hiddenapi-light-greylist.txt must be
either a mistake or no-op.
[1]: Ib9b588d11bd4017e431e3d494863987dd67384fc
6efd55e7b592eb8b04554d6060754d45fe6b80bc
Bug: 112670859
Bug: 112722706
Test: compile
Test: atest CtsInputMethodTestCases CtsInputMethodServiceHostTestCases
Change-Id: I62aa27ceb97446059ce80b00a3369c81b1c70e23
Apps can never directly use IInputMethod.attachToken(IBinder) in a
meaningful way, because
1. The real binder object is always instantiated in the IME process
and its proxies will never be exposed to any other process except
for the system server process. Even if there was actually a real
use of this method (via reflection), then the caller must have
been the same IME process.
2. However, InputMethodImpl.attachToken(IBinder) does nothing if it
gets called twice for security reasons, because the fact it can be
called only once is guaranteed in the protocol between IME and
InputMethodManagerService. This means that even if an IME somehow
called this Binder method via reflection, it must be either no-op
(if it's a secondary call) or make itself useless (if it's the
first call).
Therefore having this entry hiddenapi-light-greylist.txt must be
either a mistake or no-op.
Bug: 112722706
Test: compile
Test: atest CtsInputMethodTestCases CtsInputMethodServiceHostTestCases
Change-Id: Ie5e5b3a5f379c42cf2d5f681b556c60aeccee9f9
For packages:
com.android.internal.telephony
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: Ib9bb9c8ba23a3305c8b72600fa5fd3109b4f6ee1
Merged-In: Ia06d9a50c456201dc7ecb960ff1a1563617777a5
For packages:
android.telephony
android.telephony.cdma
android.telephony.data
android.telephony.euicc
android.telephony.gsm
android.telephony.ims
android.telephony.ims.aidl
android.telephony.ims.compat
android.telephony.ims.compat.feature
android.telephony.ims.compat.stub
android.telephony.ims.feature
android.telephony.ims.stub
android.telephony.mbms
android.telephony.mbms.vendor
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: I02d900d6d0ec9a6b2172a71911fec61d04e4d235
Merged-In: I22547ac0ed384d74d61cfd51d20c140e392a597f
We want to restrict screen reading permissions
to signature only so only the platform and
apps signed with the platform key can access
the device screen.
Add @removed and @hide to the permission so that it's
not in the docs any more without breaking any existing
apps referring to the permissions.
Bug: 111131054
Test: manually tested screenshot & bugreport
Test: atest PermissionsHostTest
Test: make & verified generated file
out/target/common/obj/PACKAGING/hiddenapi-light-greylist.txt
contains READ_FRAME_BUFFER
Change-Id: I8294aff965e889335a495ab792f893957d39ec5d
Change-Id: I8294aff965e889335a495ab792f893957d39ec5d
Revert back to using the greylist file for this code, since the annotations
would be lost next time the code is regenerated.
Bug: 110868826
Test: m
Merged-In: Ib245a2f1457ced34d5b1a3248161fa4a211ba5e9
Change-Id: Ib245a2f1457ced34d5b1a3248161fa4a211ba5e9
Revert back to using the greylist file for this code, since the annotations
would be lost next time the code is regenerated.
Bug: 110868826
Test: m
Change-Id: Ib245a2f1457ced34d5b1a3248161fa4a211ba5e9
For packages:
com.android.internal.telephony
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: Ia06d9a50c456201dc7ecb960ff1a1563617777a5
For packages:
android.widget
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: Idf7ccc7a850fa984ea16f91cdd70159087274e5c
Merged-In: Ic61019b1df85448a158fc2ba55c326353222c6b9
For packages:
android.widget
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: Ic61019b1df85448a158fc2ba55c326353222c6b9
Update boot-image-profile.txt to track libcore class renames.
The class renames may have caused a regression in some
performance metrics, though overall boot time was unaffected.
There's no reason not to update the boot-image-profile.txt.
Metrics affected:
SystemServerTiming_StartUsageService_avg
SystemServerTiming_StartJobScheduler_avg
SystemServerTiming_StartJobScheduler_avg
Test: build only
Bug: 111055375
Bug: 112595254
Change-Id: Ia421cb5dfd46cd0661fe51d481e8fca6aa35b60f
For packages:
android.view.textservice
android.view.textclassifier.logging
android.view.textclassifier
android.view.inputmethod
android.view.autofill
android.view.accessibility
android.view
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: Ie4663ebd4640b2893e575e599582d2c9530da313
Merged-In: I4147b038ed7adf0311ee9918b44766f82a057eaf
For packages:
com.android.internal
com.android.internal.annotations
com.android.internal.app
com.android.internal.app.procstats
com.android.internal.appwidget
com.android.internal.backup
com.android.internal.car
com.android.internal.content
com.android.internal.inputmethod
com.android.internal.location
com.android.internal.logging
com.android.internal.midi
com.android.internal.net
com.android.internal.os
com.android.internal.policy
com.android.internal.statusbar
com.android.internal.telecom
com.android.internal.telephony.euicc
com.android.internal.textservice
com.android.internal.util
com.android.internal.view
com.android.internal.view.animation
com.android.internal.view.menu
com.android.internal.widget
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: I1c2954c5a579f073017c1794fd2d200e0a471602
Merged-In: Ib31b52e6957869e5744dadbb35cb4584ef17187f
For packages:
com.android.internal
com.android.internal.annotations
com.android.internal.app
com.android.internal.app.procstats
com.android.internal.appwidget
com.android.internal.backup
com.android.internal.car
com.android.internal.content
com.android.internal.inputmethod
com.android.internal.location
com.android.internal.logging
com.android.internal.midi
com.android.internal.net
com.android.internal.os
com.android.internal.policy
com.android.internal.statusbar
com.android.internal.telecom
com.android.internal.telephony.euicc
com.android.internal.textservice
com.android.internal.util
com.android.internal.view
com.android.internal.view.animation
com.android.internal.view.menu
com.android.internal.widget
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: Ib31b52e6957869e5744dadbb35cb4584ef17187f